Log360 | March 3, 2022Anomaly Detection In Cybersecurity For Dummies [E-book] If you are a cybersecurity professional, you must be aware that cyberattacks, especially...
Log360 | August 12, 2019Zooming in on UEBA: Answering the "what" and the "how" What is UEBA? User and entity behavior analytics (UEBA) is a relatively new category of...
Identity and access management | December 19, 2018Monitoring users for unusual file activity As we discussed in a previous blog, the user behavior analytics (UBA) engine of ADAudit...
Identity and access management | December 6, 2018Leveraging logic and AI to detect malicious behavior in Active Directory [Webinar] Active Directory is still vital for every organization that's staying on-premises or...
NetFlow Analyzer | April 21, 2011Understanding TCP-based anomalies using NetFlow Analyzer In our previous blog, post we discussed the problems classified by the Advanced Security...
NetFlow Analyzer | March 24, 2011Detecting Suspicious Flows using NetFlow Analyzer Network security has always been the top priority of Network administrators all over the...